Newfoundland and Labrador-based commercial service provider Cougar Helicopters doesn’t take safety and security lightly.
- By Scott McNulty
- Jun 01, 2013
Cybercriminals are taking a toll on small businesses. Revealed here are some of cybercriminals' most popular tactics and how small businesses can counter-act them.
- By Ginger Hill
- May 23, 2013
It seems that masks and guns were replaced with laptops and Internet, creating an untypical bank heist.
- By Ginger Hill
- May 16, 2013
With the Virtual Security system in place, Marine Container Services has achieved its main objective: securing its cargo and reducing theft.
VP Mark Bower, on behalf of Voltage Security, has issued these statements about the recent hacking news of charges against Reuters’ Matthew Keys and yesterday’s sentencing of AT&T hacker, Andrew Auernheimer.
The number of infections has doubled since the arrest of the cyber-gang leader in Dubai, indicating continued proliferation of insidious viruses.
IT professionals are adopting the latest technologies to meet increasing bandwidth demands, create higher and faster performing networks and increase availability.
Over the past two decades, many widely known incidents have occurred that have caused the loss of life. Emergency situations, ranging from the 9/11 attacks to fires to public stampedes at sports and religious gatherings, have caused various agencies to begin to analyze the weaknesses of all types of communications systems used in venues and transportation hubs worldwide.
- By John T. Wiggins
- Jul 01, 2012
Transit authorities face security problems on an ongoing basis—everything from graffiti artists and pickpockets to precious metal theft and fuel siphoning. For years now, security experts have relied on camera installations for incident control, but too often surveillance video has been used more as a forensic tool to investigate the aftermath rather than as a practical tool to detect and possibly prevent incidents from happening.
- By Anthony Incorvati
- Jul 01, 2012
Many of today’s growth-oriented businesses aim to extend operations to other states and countries after solidifying success in existing markets, and this trend will only continue to accelerate.
- By Renae Leary
- Jun 01, 2012
The Department of Homeland Security’s Science and Technology Directorate (S&T) has joined forces with the Federal Highway Administration and the U.S. Army Corps of Engineers Engineer Research and Development Center to conduct series of experiments that assess potential vulnerability of critical structural components of aging steel bridges.
Smarter Security Inc. recently announced that one of the country’s Top 25 largest airports recently expanded its use of the company’s Door Detective CL to better secure employee-only doors and elevators in the airport terminal.
HID Global announced today that the company’s network access control solutions and contactless readers have been deployed at the Fuxi power plant in China’s Sichuan province. The new system provides increased security that ensures the operational safety of production and facility areas, offers real-time monitoring at the central station and enables security administrators to remotely close facility doors for improved safety management.
With the constant evolution of security threats, forward-thinking companies must closely scrutinize their security framework. Key components in an organization's security infrastructure are digital certificates, which not only provide identification assurances, but also support secure data transfer.
In an ideal world, every tunnel, train terminal, and critical building would be built like a fortress to withstand any emergency. But in the real world, construction costs matter and engineers "build to code." While Americans can take comfort that their critical infrastructure meets minimum codes for safety, when terror—or nature—hits especially hard, minimum codes provide minimal comfort.
Salvaging the existing investment in coax cabling is often the number-one reason surveillance users are reluctant to switch to network video. The perceived cost of storage is a close second.
- By Fredrik Nilsson
- Feb 01, 2012
A benchmark study of 19 of the world’s 20 leading economies found that the United Kingdom and the United States lead Group of 20 (G20) countries in their ability to withstand cyber attacks and to deploy the digital infrastructure necessary for a productive and secure economy. The index also found that several major economies—Argentina, Indonesia, Russia and Saudi Arabia—do not have cybersecurity plans and do not appear to be developing them.
Power supplies are a vital system component but are not always considered
to be mission critical. Often situated in a utility area, power
supplies are essential to continuous, trouble-free operation.
- By Ralph C. Jensen
- Jan 01, 2012
By the time disaster strikes, it is too late to take many of the important steps to protect a campus. Unfortunately, many educational institutions overlook disaster preparedness planning or simply assume a calamity won’t happen on their campus.
- By Bill Allen
- Jan 01, 2012
Critical infrastructure providers come from industries that are of such importance that if their cyber networks were successfully attacked and disabled, it would result in an actual threat to national security.